Exam 14: Workshop 14: Implement Your Database
Exam 1: Workshop 1: The Four Main Database Objects108 Questions
Exam 2: Workshop 2: Tables, Keys, and Relationships105 Questions
Exam 3: Workshop 3: Queries and Data Access106 Questions
Exam 4: Workshop 4: Access Information From an Access Database104 Questions
Exam 5: Workshop 5: Advanced Tables108 Questions
Exam 6: Workshop 6: Pattern Matching and Functions in Queries102 Questions
Exam 7: Workshop 7: Aggregated Calculations, Subquerying, and Sql103 Questions
Exam 8: Workshop 8: Action Queries and Advanced Relationships100 Questions
Exam 9: Workshop 9: Advanced Reports and Mailing Labels100 Questions
Exam 10: Workshop 10: Advanced Form Settings and Form Types99 Questions
Exam 12: Workshop 12: Create a Refined User Experience With Macros100 Questions
Exam 13: Workshop 13: Use VBA in Access98 Questions
Exam 14: Workshop 14: Implement Your Database98 Questions
Exam 15: Normalize a Database for Effective Design89 Questions
Exam 16: The Common Features of Microsoft Office81 Questions
Exam 17: Efficient Interaction With a Touch Screen71 Questions
Select questions type
Preventing a table from being opened directly requires hiding the ________.
(Short Answer)
4.9/5
(37)
Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
(True/False)
4.7/5
(36)
After you run the ________,it provides three types of analysis results.
(Short Answer)
4.8/5
(29)
Information is ________ using a key.In Access,the key will be a password.In other applications,the key can be a separate file.
(Multiple Choice)
4.8/5
(39)
In ________ implementations,small groups of a company start using the new database.Gradually,more groups come on board as the system is perfected,until the entire organization is using the new system.
(Short Answer)
4.9/5
(32)
The keyboard shortcut of ________ shows or hides the Navigation Pane
(Multiple Choice)
4.9/5
(30)
Which of the following is NOT true regarding linked tables and the Linked Table Manager?
(Multiple Choice)
4.9/5
(39)
To ensure the ________ of the database,access to several features must be eliminated.
(Multiple Choice)
4.9/5
(39)
Special keys are a set of four keyboard shortcuts that can be disabled when securing a database.
(True/False)
4.7/5
(30)
The back-end database is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.
(True/False)
4.8/5
(40)
The back-end database can be stored in a(n)________ where a company's technical support can ensure the data are protected and backed up regularly.
(Short Answer)
4.8/5
(34)
The Performance Analyzer can only review individual Access objects.
(True/False)
4.9/5
(32)
The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.
(Short Answer)
4.8/5
(35)
When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
(True/False)
4.8/5
(34)
To properly secure a database,special keys should be disabled,because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database.
(True/False)
4.8/5
(41)
Which of the following common features of Access 2013 is NOT compatible with Access 2003?
(Multiple Choice)
4.8/5
(31)
The ________ of a database creates a front-end and back-end system.
(Multiple Choice)
4.9/5
(22)
Ultimately,to protect a database and its information,passwords and decryption can be implemented.
(True/False)
4.9/5
(32)
The ________ is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.
(Multiple Choice)
4.8/5
(39)
In a ________ implementation,the legacy system and new system are used concurrently.
(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)